CVE-2014-125127 – Apache Flight Denial of Service (DoS)
The following table lists the changes that have been made to the CVE-2014-125127 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 596c5446-0ce5-4ba2-aa66-48b3b757a647 Sep. 03, 2025 Action […]
Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack
Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack In response to the discovery of actively exploited 0-day vulnerabilities, Google has released its September 2025 Android Security Bulletin, rolling out patch level 2025-09-05 to safeguard millions of … Read more Published Date: Sep 03, 2025 (2 hours, 17 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-9817 – Wireshark SSH Dissector Denial of Service
Affected Products The following products are affected by CVE-2025-9817 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below. No affected product recoded yet
CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks
CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks CISA has issued an urgent advisory concerning a newly disclosed zero-day vulnerability in Meta Platforms’ WhatsApp messaging service (CVE-2025-55177). This flaw, categorized under CWE-863: Incorrect A … Read more Published Date: Sep 03, 2025 (3 hours, 5 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-55177 CVE-2025-53772
PoC Exploit Released for IIS WebDeploy Remote Code Execution Vulnerability
PoC Exploit Released for IIS WebDeploy Remote Code Execution Vulnerability A proof-of-concept exploit for CVE-2025-53772, a critical remote code execution vulnerability in Microsoft’s IIS Web Deploy (msdeploy) tool, was published this week, raising urgent alarms across the . … Read more Published Date: Sep 03, 2025 (55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-53772
CVE-2025-9378 – Vayu Blocks for WordPress – Stored Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-9378 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]
CVE-2025-8663 – upKeeper Manager Information Disclosure
The following table lists the changes that have been made to the CVE-2025-8663 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 80f39f49-2521-4ee7-9e17-af5d55e8032f Sep. 03, 2025 Action […]
CVE-2025-58210 – Makeaholic Missing Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2025-58210 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]
CVE-2024-32444 – InspiryThemes RealHomes Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2024-32444 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 03, 2025 Action […]
Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes
Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes Threat actors are rapidly weaponizing Hexstrike-AI, a recently released AI-powered offensive security framework, to scan for and exploit zero-day CVEs in under ten minutes. Originally marketed as an o … Read more Published Date: Sep 03, 2025 (2 hours, 8 minutes ago) Vulnerabilities has been […]